TW201415278A - System and method for monitoring application - Google Patents
System and method for monitoring application Download PDFInfo
- Publication number
- TW201415278A TW201415278A TW101136022A TW101136022A TW201415278A TW 201415278 A TW201415278 A TW 201415278A TW 101136022 A TW101136022 A TW 101136022A TW 101136022 A TW101136022 A TW 101136022A TW 201415278 A TW201415278 A TW 201415278A
- Authority
- TW
- Taiwan
- Prior art keywords
- application
- electronic device
- usage rights
- protection action
- risk factor
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Stored Programmes (AREA)
- Storage Device Security (AREA)
Abstract
Description
本發明涉及一種應用程式監控系統及方法,特別涉及一種監控應用程式是否為危險應用程式的監控系統及方法。The present invention relates to an application monitoring system and method, and more particularly to a monitoring system and method for monitoring whether an application is a dangerous application.
用戶可通過網路或其他方式下載各種應用程式至智慧手機、電腦等。下載的某些應用程式有可能為危險應用程式,在用戶使用這些應用程式的時候,有可能會導致重要資訊的洩露等。例如,某個遊戲程式需要開啟網路使用權限才能正常運行時,則該遊戲程式有可能為危險應用程式,運行該遊戲程式有可能會導致個人資訊的洩露。而危險應用程式啟動可能會導致重要資訊的洩露的使用權限通常是在後臺運行,用戶並不知曉。Users can download various applications to smart phones, computers, etc. via the Internet or other means. Some of the downloaded applications may be dangerous applications. When users use these applications, they may lead to the disclosure of important information. For example, if a game program needs to enable network access to run normally, the game program may be a dangerous application. Running the game program may lead to the disclosure of personal information. The use of a dangerous application to launch may result in the disclosure of important information is usually run in the background, the user does not know.
有鑒於此,有必要提供一種應用程式監控系統及應用程式監控方法。In view of this, it is necessary to provide an application monitoring system and an application monitoring method.
所述應用程式監控系統應用於一電子裝置,所述電子裝置上安裝有多個應用程式,所述電子裝置的作業系統記錄每一應用程式安裝時向所述作業系統申請的需要所述電子裝置開通的所有使用權限,所述電子裝置存儲有一記錄表,記錄每一應用程式運行時需要所述電子裝置開通的所有合法的使用權限,所述應用程式監控系統包括:一獲取模組,在一應用程式開啟時,從所述電子裝置的作業系統中獲取所述當前開啟的應用程式運行時需要所述電子裝置開通的所有使用權限;一判斷模組,根據所述記錄表判斷所述獲取模組獲取的所有使用權限中是否存在一個或多個非法的使用權限;以及一執行模組,在所述獲取的所有使用權限中存在一個或多個非法的使用權限時,執行保護動作。The application monitoring system is applied to an electronic device, and the electronic device is installed with a plurality of applications, and the operating system of the electronic device records the need for the electronic device to be applied to the operating system when each application is installed. All the usage rights of the opening, the electronic device stores a record table, and records all legal usage rights required for the electronic device to be opened when each application runs. The application monitoring system includes: an acquisition module, in an When the application is started, obtaining, from the operating system of the electronic device, all the usage rights that the electronic device is required to be opened when the currently open application is running; and a determining module determining the acquisition mode according to the recording table Whether one or more illegal usage rights exist in all the usage rights acquired by the group; and an execution module performs a protection action when one or more illegal usage rights exist in all the acquired usage rights.
所述應用程式監控方法應用於一電子裝置,所述電子裝置上安裝有多個應用程式,所述電子裝置的作業系統記錄每一應用程式安裝時向所述作業系統申請的需要所述電子裝置開通的所有使用權限,所述電子裝置存儲有一記錄表,記錄每一應用程式運行時需要所述電子裝置開通的所有合法的使用權限,所述方法包括:在一應用程式開啟時,從所述電子裝置的作業系統中獲取所述當前開啟的應用程式運行時需要所述電子裝置開通的所有使用權限;根據所述記錄表判斷所述獲取的所有使用權限中是否存在一個或多個非法的使用權限;以及在所述獲取的所有使用權限中存在一個或多個非法的使用權限時,執行保護動作。The application monitoring method is applied to an electronic device, and the electronic device is installed with a plurality of applications, and the operating system of the electronic device records the need for the electronic device to be applied to the operating system when each application is installed. All the usage rights of the opening, the electronic device stores a record table, and records all legal usage rights required for the opening of the electronic device when the application is running, and the method includes: when the application is opened, from the Obtaining, in the operating system of the electronic device, all the usage rights that are required to be opened by the electronic device when the currently open application is running; determining, according to the record table, whether one or more illegal uses exist in the acquired usage rights. Permission; and when one or more illegal usage rights exist in all of the acquired usage rights, the protection action is performed.
本發明中的應用程式監控系統及方法可監控開啟的應用程式是否為危險應用程式,並在開啟的應用程式為危險應用程式時,執行保護動作,防止危險應用程式對用戶造成損失。The application monitoring system and method of the present invention can monitor whether the open application is a dangerous application, and perform a protection action when the open application is a dangerous application, thereby preventing the dangerous application from causing loss to the user.
請參考圖1及圖2,本發明中的應用程式監控系統10應用於一安裝有多個應用程式30的電子裝置100。應用程式監控系統10用於監控電子裝置100中的危險應用程式。電子裝置100的作業系統20記錄每一應用程式30安裝時向作業系統20申請的需要電子裝置100開通的所有使用權限,如網路許可權,攝像頭開啟許可權,藍牙許可權等。電子裝置100還存儲有一記錄表40,記錄每一應用程式30運行時需要電子裝置100開通的所有的合法的使用權限。在本實施方式中,使用者可從提供正規的應用程式的提供商處知曉該正規的應用程式運行時需要電子裝置100開通的使用權限,並將該些使用權限寫入電子裝置100中,該些使用權限則為該正規的應用程式運行時需要電子裝置100開通的合法的使用權限。使用者從網站上或通過其他途徑下載至電子裝置100的應用程式中有可能存在危險應用程式,危險應用程式運行時除了需要電子裝置100開通相應的正規的應用程式運行時需要的合法的使用權限外,還需要電子裝置100開通其他的使用權限,而開通其他的使用權限則有可能造成重要資訊洩露等。例如,一正規的A遊戲軟體運行時需要電子裝置100開通感應器許可權。而使用者從某網站上下載的A遊戲軟體運行時除了需要電子裝置100開通感應器許可權外,還需要電子裝置100開通網路許可權,則從網站上下載的A遊戲軟體為危險應用程式。在本實施方式中,電子裝置100為具有Android系統的智慧手機。Referring to FIG. 1 and FIG. 2, the application monitoring system 10 of the present invention is applied to an electronic device 100 in which a plurality of applications 30 are installed. The application monitoring system 10 is for monitoring dangerous applications in the electronic device 100. The operating system 20 of the electronic device 100 records all usage rights, such as network permission, camera open permission, Bluetooth permission, etc., that are required to be opened to the operating system 20 when the application 30 is installed. The electronic device 100 also stores a record table 40 that records all legal usage rights that the electronic device 100 needs to be activated when each application 30 runs. In this embodiment, the user can know from the provider that provides the regular application that the normal application needs to be opened by the electronic device 100 during operation, and write the usage rights into the electronic device 100. These usage rights are legal usage rights required for the electronic device 100 to be activated when the regular application is running. There may be a dangerous application in the application downloaded from the website or through other means to the electronic device 100. In addition to the legitimate usage permission required when the dangerous application is running, the electronic device 100 needs to open the corresponding formal application. In addition, the electronic device 100 is required to open other usage rights, and the opening of other usage rights may cause important information leakage. For example, a regular A game software runtime requires the electronic device 100 to turn on sensor permissions. When the user downloads the A game software from a website, in addition to requiring the electronic device 100 to open the sensor permission, the electronic device 100 is required to open the network permission, and the A game software downloaded from the website is a dangerous application. . In the present embodiment, the electronic device 100 is a smart phone having an Android system.
應用程式監控系統10包括一獲取模組12、一判斷模組14及一執行模組16。以下結合圖3的方法流程圖說明各模組的具體功能。The application monitoring system 10 includes an acquisition module 12, a determination module 14, and an execution module 16. The specific functions of each module will be described below in conjunction with the method flowchart of FIG.
步驟S301中,獲取模組12在一應用程式30開啟時,從電子裝置100的作業系統20中獲取當前開啟的應用程式30運行時需要電子裝置100開通的所有使用權限。In step S301, the acquisition module 12 acquires, from the operating system 20 of the electronic device 100, all the usage rights required for the electronic device 100 to be activated when the currently open application 30 is running.
步驟S302中,判斷模組14根據電子裝置100中的記錄表40判斷獲取模組12獲取的所有使用權限中是否存在一個或多個非法的使用權限。在存在非法的使用權限時,執行步驟S303,否則執行步驟S304。In step S302, the determination module 14 determines, according to the record table 40 in the electronic device 100, whether one or more illegal usage rights exist in all the usage rights acquired by the acquisition module 12. When there is an illegal use right, step S303 is performed, otherwise step S304 is performed.
步驟S303中,執行模組16執行保護動作。執行模組16可輸出一提示資訊,提示用戶當前開啟的應用程式30為一危險應用程式,或者直接遮罩當前開啟的應用程式30,使用戶不能操作該應用程式30。進一步,執行模組16還根據預設的規則計算電子裝置100開通所述一個或多個非法的使用權限的危險係數,並根據計算出來的危險係數執行與當前開啟的應用程式30相關的動作。在一種實施方式中,預設的規則為每增加一個非法的使用權限,危險係數增加10%。在其他實施方式中,不同的使用權限對應不同的危險係數,如攝像頭使用權限對應的危險係數為10%,網路使用權限對應的危險係數為30%。在本實施方式中,執行模組16在計算出來的危險係數小於一預設值時,輸出一提示資訊以提示用戶當前開啟的應用程式30為一危險的應用程式,以及在計算出來的危險係數等於或大於該預設值時,直接遮罩當前開啟的應用程式30。In step S303, the execution module 16 performs a protection action. The execution module 16 can output a prompt message, prompting the user that the currently open application 30 is a dangerous application, or directly masking the currently open application 30, so that the user cannot operate the application 30. Further, the execution module 16 further calculates, according to a preset rule, the risk factor of the one or more illegal usage rights of the electronic device 100, and performs an action related to the currently open application 30 according to the calculated risk factor. In one embodiment, the preset rule is that the risk factor is increased by 10% for each additional illegal usage right. In other embodiments, different usage rights correspond to different risk factors, such as a risk factor corresponding to 10% of the camera usage rights and a risk factor corresponding to 30% of the network usage rights. In this embodiment, when the calculated risk factor is less than a preset value, the execution module 16 outputs a prompt message to prompt the user that the currently opened application 30 is a dangerous application, and the calculated risk factor. When it is equal to or greater than the preset value, the currently open application 30 is directly masked.
步驟S304中,執行模組16通知作業系統20正常運行當前開啟的應用程式30。In step S304, the execution module 16 notifies the operating system 20 to normally run the currently open application 30.
100...電子裝置100. . . Electronic device
20...作業系統20. . . working system
30...應用程式30. . . application
40...記錄表40. . . recording sheet
10...應用程式監控系統10. . . Application monitoring system
12...獲取模組12. . . Get module
14...判斷模組14. . . Judging module
16...執行模組16. . . Execution module
S301...獲取當前開啟的應用程式運行時需要電子裝置開通的所有使用權限S301. . . Get all access rights for the currently open application to be opened by the electronic device
S302...是否存在非法的使用權限S302. . . Is there illegal use permission?
S303...執行保護動作S303. . . Perform protection action
S304...通知電子裝置正常運行當前開啟的應用程式S304. . . Inform the electronic device to run the currently open application
圖1為本發明一種實施方式中應用程式監控系統的功能模組圖。FIG. 1 is a functional block diagram of an application monitoring system according to an embodiment of the present invention.
圖2為本發明一種實施方式中執行圖1中的應用程式監控系統的架構圖。2 is a block diagram of an application monitoring system of FIG. 1 in an embodiment of the present invention.
圖3為本發明一種實施方式中應用程式監控方法的流程圖。3 is a flow chart of an application monitoring method in an embodiment of the present invention.
S301...獲取當前開啟的應用程式運行時需要電子裝置開通的所有使用權限S301. . . Get all access rights for the currently open application to be opened by the electronic device
S302...是否存在非法的使用權限S302. . . Is there illegal use permission?
S303...執行保護動作S303. . . Perform protection action
S304...通知電子裝置正常運行當前開啟的應用程式S304. . . Inform the electronic device to run the currently open application
Claims (12)
一獲取模組,在一應用程式開啟時,從所述電子裝置的作業系統中獲取所述當前開啟的應用程式運行時需要所述電子裝置開通的所有使用權限;
一判斷模組,根據所述記錄表判斷所述獲取模組獲取的所有使用權限中是否存在一個或多個非法的使用權限;以及
一執行模組,在所述獲取的所有使用權限中存在一個或多個非法的使用權限時,執行保護動作。An application monitoring system is applied to an electronic device, wherein the electronic device is installed with a plurality of applications, and the operating system of the electronic device records the need for the electronic device to be applied to the operating system when each application is installed. All the usage rights of the opening, the electronic device stores a record table, and records all legal use rights that the electronic device needs to be opened when each application runs. The improvement is that the application monitoring system includes:
An obtaining module, when an application is opened, obtaining, from the operating system of the electronic device, all usage rights required for the currently open application to be opened by the electronic device;
a determining module, determining, according to the record table, whether one or more illegal usage rights exist in all the usage rights acquired by the obtaining module; and an execution module, wherein one of the acquired usage rights exists A protection action is performed when multiple illegal usage rights are used.
在一應用程式開啟時,從所述電子裝置的作業系統中獲取所述當前開啟的應用程式運行時需要所述電子裝置開通的所有使用權限;
根據所述記錄表判斷所述獲取的所有使用權限中是否存在一個或多個非法的使用權限;以及
在所述獲取的所有使用權限中存在一個或多個非法的使用權限時,執行保護動作。An application monitoring method is applied to an electronic device, wherein the electronic device is installed with a plurality of application programs, and the operating system of the electronic device records the need for the electronic device to be applied to the operating system when each application is installed. All the usage rights of the opening, the electronic device stores a record table, and records all legal usage rights that the electronic device needs to be opened when each application runs. The improvement is that the method includes:
When an application is started, obtaining, from the operating system of the electronic device, all the usage rights that the currently opened application needs to be opened when the currently open application is running;
Determining, according to the record table, whether one or more illegal usage rights exist in all the acquired usage rights; and performing one or more illegal usage rights among the acquired usage rights, performing a protection action.
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201210345518XA CN102915417A (en) | 2012-09-18 | 2012-09-18 | Application monitoring system and application monitoring method |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| TW201415278A true TW201415278A (en) | 2014-04-16 |
Family
ID=47613780
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW101136022A TW201415278A (en) | 2012-09-18 | 2012-09-28 | System and method for monitoring application |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US20140082727A1 (en) |
| CN (1) | CN102915417A (en) |
| TW (1) | TW201415278A (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI651624B (en) * | 2017-01-25 | 2019-02-21 | 楊建綱 | Smart hardware safety carrier |
| US10425821B2 (en) | 2017-01-25 | 2019-09-24 | Chien-Kang Yang | Mobile data storage device with access control functionality |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9538384B2 (en) * | 2013-08-30 | 2017-01-03 | Cellco Partnership | Method and apparatus for a device management application |
| CN104660606B (en) * | 2015-03-05 | 2017-10-20 | 中南大学 | A kind of long-distance monitoring method of application security |
| CN104915599A (en) * | 2015-05-30 | 2015-09-16 | 广东欧珀移动通信有限公司 | Application program monitoring method and terminal |
| CN106325993A (en) * | 2016-08-22 | 2017-01-11 | 宇龙计算机通信科技(深圳)有限公司 | Freezing method of application program and terminal |
| CN108683652A (en) * | 2018-05-04 | 2018-10-19 | 北京奇安信科技有限公司 | A kind of method and device of the processing attack of Behavior-based control permission |
| CN110727941B (en) * | 2019-08-23 | 2023-10-13 | 深圳市轱辘车联数据技术有限公司 | Privacy data protection method and device, terminal equipment and storage medium |
Family Cites Families (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB9523922D0 (en) * | 1995-11-23 | 1996-01-24 | At & T Global Inf Solution | Method of authenticating an application program and a system therefor |
| US6801940B1 (en) * | 2002-01-10 | 2004-10-05 | Networks Associates Technology, Inc. | Application performance monitoring expert |
| US7383584B2 (en) * | 2002-03-27 | 2008-06-03 | Advanced Micro Devices, Inc. | System and method for controlling device-to-device accesses within a computer system |
| US7810091B2 (en) * | 2002-04-04 | 2010-10-05 | Mcafee, Inc. | Mechanism to check the malicious alteration of malware scanner |
| US7607010B2 (en) * | 2003-04-12 | 2009-10-20 | Deep Nines, Inc. | System and method for network edge data protection |
| US7401361B2 (en) * | 2004-10-13 | 2008-07-15 | Lenovo (Singapore) Pte. Ltd. | System and method for reducing virus scan time |
| US7930733B1 (en) * | 2006-04-10 | 2011-04-19 | At&T Intellectual Property Ii, L.P. | Method and system for execution monitor-based trusted computing |
| US20080030331A1 (en) * | 2006-08-04 | 2008-02-07 | Aten International Co., Ltd. | Anti-thief electronic device and method thereof |
| US8199680B2 (en) * | 2007-02-09 | 2012-06-12 | Cisco Technology, Inc. | Correlating calls after a referral |
| CN102405636A (en) * | 2009-04-30 | 2012-04-04 | 日本电气株式会社 | Fraudulent call detection device, fraudulent call detection method, and fraudulent call detection program |
| US8799583B2 (en) * | 2010-05-25 | 2014-08-05 | International Business Machines Corporation | Atomic execution over accesses to multiple memory locations in a multiprocessor system |
| CN102446259B (en) * | 2010-09-30 | 2014-12-31 | 联想(北京)有限公司 | Component access control method and electronic equipment |
| US8868621B2 (en) * | 2010-10-21 | 2014-10-21 | Rillip, Inc. | Data extraction from HTML documents into tables for user comparison |
| CN102186167B (en) * | 2011-04-11 | 2016-02-10 | 中兴通讯股份有限公司 | A kind of to applying the method and system monitored |
| TWI461958B (en) * | 2012-06-22 | 2014-11-21 | Wistron Corp | Permission management method for applications, electronic device thereof, and computer readable medium |
-
2012
- 2012-09-18 CN CN201210345518XA patent/CN102915417A/en active Pending
- 2012-09-28 TW TW101136022A patent/TW201415278A/en unknown
-
2013
- 2013-04-07 US US13/858,075 patent/US20140082727A1/en not_active Abandoned
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI651624B (en) * | 2017-01-25 | 2019-02-21 | 楊建綱 | Smart hardware safety carrier |
| US10425821B2 (en) | 2017-01-25 | 2019-09-24 | Chien-Kang Yang | Mobile data storage device with access control functionality |
Also Published As
| Publication number | Publication date |
|---|---|
| US20140082727A1 (en) | 2014-03-20 |
| CN102915417A (en) | 2013-02-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| TW201415278A (en) | System and method for monitoring application | |
| US11120130B2 (en) | Method and apparatus for protecting kernel control-flow integrity using static binary instrumentation | |
| EP3103056B1 (en) | Methods and apparatus for protecting operating system data | |
| Agarwal et al. | ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing | |
| Mylonas et al. | Smartphone security evaluation The malware attack case | |
| Backes et al. | Appguard–fine-grained policy enforcement for untrusted android applications | |
| Spensky et al. | Sok: Privacy on mobile devices–it’s complicated | |
| Werthmann et al. | Psios: bring your own privacy & security to ios devices | |
| CA3023939C (en) | Method and apparatus for dynamic executable verification | |
| CN105205413B (en) | A data protection method and device | |
| WO2016045328A1 (en) | Terminal application control method and apparatus, and storage medium | |
| TW201541278A (en) | Method, electronic device, and user interface for on-demand detecting malware | |
| CN106599709A (en) | Privacy information leakage prevention method and device as well as terminal | |
| Alepis et al. | Hey doc, is this normal?: exploring android permissions in the post marshmallow era | |
| CN111062032A (en) | Anomaly detection method and system and computer-readable storage medium | |
| US10713352B2 (en) | Method and apparatus for trusted measurement | |
| KR20150087363A (en) | Firmware-implemented software licensing | |
| CN102938037B (en) | A kind of plug-in unit call method for browser and plugin manager | |
| CN105989294A (en) | Detection method and apparatus for Android package | |
| KR101638257B1 (en) | Method for protecting source code of application and apparatus for performing the method | |
| Mylonas et al. | On the feasibility of malware attacks in smartphone platforms | |
| CN102594815A (en) | Method and device for setting user right and executing corresponding operation before login of operating system | |
| Dar et al. | Enhancing security of Android & IOS by implementing need-based security (NBS) | |
| Msgna et al. | Secure application execution in mobile devices | |
| JP2015517701A (en) | Web page information alteration blocking device and method |